You are on page 1of 3

Information Technology Database System Security

Student’s Name

Institutional Affiliation

Course Name and Number

Instructor’s Name

Assignment Due Date


Information Technology Database System Security

Introduction

In today’s era, observing data privacy, confidentiality and accuracy have become daily

troubles. The structure of most databases of companies reveal the interconnectedness of the

network domains and this feature makes it easy for looping. These databases later become

accessible to almost anybody who could otherwise wish to customize information mainly

because of this idea of interconnectivity. In return this creates a bad attitude towards the

application of technology as any person is capable of gaining an access to one’s confidential data

at a little or no potential cost. Advancement by the aid of technology sustains us make our lives

affordable however it has a remarkable danger and the worst of it is the idea of cyberwarfare. In

some circumstances, normal web clients may have no information about cyberwarfare and

paying no attention to what they do in the event of digital assault casualty, so many people tend

to fail resisting cybercrimes around the world especially since the technology is enhancing at a

faster rate. Cyberwarfare is an illegal activity which causes harm to someone else by the support

of a computer system and a network (Nicholson, 2012). These crimes occur through sabotaging

privacy and confidentiality. Whenever there is loss of protected or private data, it favors an

approach to misconducts like cyber terrorism, espionage, hacking, copyright infringement and

spamming. The danger once dominated by the viruses and worms by irresponsible hackers is

now governed by new species of cybercriminals. The above tremendous trends in the rise of

cyberwarfare compels for enforcement of cyber security at the system to help isolate cybercrime.
References

Nicholson, A., Webber, S., Dyer, S., Patel, T., & Janicke, H. (2012). SCADA security in the

light of Cyber-Warfare. Computers & Security, 31(4), 418-436.

You might also like